Cleanroom Software Engineering in Telecommunication Applications

Henrik Cosmo, Per Runeson, Anders Sixtensson, Claes Wohlin

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

A methodology for developing software intensive systems denoted Cleanroom Software Engineering is presented. The methodology has been developed at IBM and Software Engineering Technology (SET) in the USA, and is currently being adapted and applied to the field of telecommunications by Q-Labs.
The main objective of Cleanroom is to introduce a set of management and engineering techniques which shall form a sound basis for developing zero defect software. The objective of the paper is to give an overview to how Cleanroom can be used and adapted to provide a comprehensive and manageable software engineering process to develop dependable software
systems.
The emphasis in the paper is on the work made to adapt the development methodology to telecommunications. The adaptations consist of two main areas, i.e. a development method and a certification method. The objective of the development method is to capture several different aspects of the system at an early stage by using different description techniques, while the objective of the certification method is to certify the reliability level, instead of as in traditional
testing locate failures.
Original languageEnglish
Title of host publicationProceedings Software Engineering and its Applications in Telecommunications
Place of PublicationParis, France
Pages369-378
Number of pages10
Publication statusPublished - 1993
Externally publishedYes
EventSoftware Engineering & its Applications, Sixth International Conference - Paris, France
Duration: 1993 Nov 151993 Nov 19

Conference

ConferenceSoftware Engineering & its Applications, Sixth International Conference
Country/TerritoryFrance
CityParis
Period1993/11/151993/11/19

Subject classification (UKÄ)

  • Software Engineering

Fingerprint

Dive into the research topics of 'Cleanroom Software Engineering in Telecommunication Applications'. Together they form a unique fingerprint.

Cite this